نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We speci cally address the problem of fragile digital watermarking for the tamper-proo ng of still images. Applications of our problem include authentication for courtroom evidence, insurance claims and journalistic photography. We present a novel fragile watermarking approach which embeds a ...
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES) . In this pa...
Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, we propose an approach that requires only minimal changes to existing commo...
Digital watermarking appears today as an e.cient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with di/erent requirements. The three main identi1ed scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proo1ng, aiming at detecting malicious modi1cations; and authe...
Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar lines of work, in our case, the party is not obliged to cheat, but he has ability to cheat if and when needed. The empowered party is the sende...
Security of networks is the most important challenge of the Internet of Things (IoT) that need smarter security mechanisms. Therefore, a tamper detection (TD) is an efficient security mechanism based on networks of IoT for healthcare applications, which used to deal with security violations. In this paper, a new TD mechanism based IoT for real data of healthcare application called (IOTTD) model...
در این مطالعه ژنومی متشکل از 10 کروموزوم هر یک به طول 200 سانتی¬مورگان شبیه¬سازی شد. نشانگرها بر روی ژنوم با فواصل 2/0 سانتی¬مورگان طراحی شدند و جایگاههای ژنی مؤثر بر صفات بر روی ژنوم با توزیع تصادفی و تعداد متغیر شبیه¬سازی شدند و تنها اثرات افزایشی ژنها در نظر گرفته ¬شد. در ابتدا جمعیت پایه¬ای از حیوانات با اندازه مؤثر 100 (50 نر و 50 ماده) شبیه¬سازی شد و این ساختار جمعیتی برای 50 نسل با آمیز...
We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید